Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach

Size: px
Start display at page:

Download "Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach"

Transcription

1 Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach Tong Li, Jennifer Horkoff University of Trento, Trento, Italy {tong.li,horkoff}@disi.unitn.it Abstract. Security has been a growing concern for most large organizations, especially financial and government institutions, as security breaches in the socio-technical systems they depend on are costing billions. A major reason for these breaches is that socio-technical systems are designed in a piecemeal rather than a holistic fashion that leaves parts of a system vulnerable. To tackle this problem, we propose a three-layer security analysis framework for socio-technical systems involving business processes, applications and physical infrastructure. In our proposal, global security requirements lead to local security requirements that cut across layers and upper-layer security analysis influences analysis at lower layers. Moreover, we propose a set of analytical methods and a systematic process that together drive security requirements analysis throughout the three-layer framework. Our proposal supports analysts who are not security experts by defining transformation rules that guide the corresponding analysis. We use a smart grid example to illustrate our approach. Keyword: Security Requirements Model Multilayer Socio- Technical System Security Pattern 1 Introduction Like all non-functional requirements, security requirements have a global influence over the design of a socio-technical system. Socio-technical systems (STSs) are organizational systems consisting of people, business processes, software applications, and hardware components. Such systems often include a rich physical infrastructure consisting of not only computers, but also buildings, cable networks and the like. Due to their ever-increasing complexity, STSs have been experiencing a growing number of security breaches [5], caused by security flaws and vulnerabilities. A common theme for many of these breaches is that security solutions are not designed in a holistic fashion. Rather, they are dealt with in a piecemeal fashion, by different analysts and at different times, using different analysis techniques. For example, Mouratidis [13] and Liu [11] analyze security issues at organizational level; Herrmann [9] analyzes security requirements in business process level; Lamsweerde investigate security requirements for software [21]. This leads to security gaps and vulnerabilities for parts of a STS, while others may be costly and over-protected. For example, when designing an encryption

2 function for a smart meter system, a designer may focus only on the software (application layer). In this case, the software can implement encryption by calling functions implemented by an external hardware chip. However, with this design alternative, calling the external functions means that the software first sends unencrypted text to the chip, creating a vulnerability which can be exploited by non-authorized people (business layer) via bus-snooping (physical layer) [1]. By focusing only on the software, vulnerabilities from the physical layer and business layer perspectives are missed. To tackle this problem, we propose a holistic approach to security engineering where STSs consist of three layers: a business layer, a (software) application layer, and a physical infrastructure layer. Within this framework, each layer focuses on particular concerns and has its own requirements and specifications, which are captured by goal-oriented requirements modeling language. In particular, specifications in one layer dictate requirements in lower layers. In this manner, the security requirements analysis carried out in one layer seamlessly leads to the analysis in the next layer down. Thus, security requirements derived in different layers can cooperate properly to deliver security to systems. Go back to the aforementioned encryption example, if a holistic view is taken, alternative security treatments are identified: 1) apply software-based encryption, which avoid hardware access issues; 2) apply hardware-based encryption, as well as additional protections on corresponding hardware. In this way, security mechanisms applied in different layers are coordinated, and the aforementioned vulnerability can be avoid. Based on this framework, a systematic process is provided to drive security analysis both within one layer and across layers. To support analysts without much security knowledge, we propose a set of analytical methods and corresponding transformation rules to facilitate the security analysis process. This security analysis framework is particularly designed for existing systems that have a determined functional design. Our approach takes a number of highlevel security requirements as input, analyzes their influences over three layers, and produces holistic security treatments that consist of coordinated security mechanisms in different layers. In the reminder of this paper, we first describe a smart grid example in Section 2, which is used to illustrate our approach throughout the paper. Next, in Section 3 we introduce our research baseline on requirements and specification models, and security requirements analysis. Section 4 presents the three-layer security analysis framework, while Section 5 describes a set of security requirement analysis methods and a systematic analysis process. Section 6 compares our proposal to other work, and finally in Section 7 we conclude the whole paper and discuss future work. 2 Motivating Example In this section, we introduce a smart grid example, which leverages information and communication technologies to enable two-way communications between

3 customers and energy providers. This example involves a number of scenarios, and we exclusively focus on a real-time pricing scenario. In this scenario, the service provider periodically collects customer s energy consumption data, based on which they can create new prices to balance loads on the power grid. A business layer requirement model for this scenario is shown in Fig. 1. We will introduce details of the goal-oriented modeling language in Section 4. Because this system involves a wide scope of artifacts, which vary from business processes to physical devices, it is difficult to provide a cost-benefit security treatment to protect the whole system from damages. As reported by National Vulnerability base, on average, 15 new vulnerabilities of the Supervisory Control and Acquisition system (a major control system used in power grid systems) are publicly disclosed each day. Not surprisingly, the presence of these vulnerabilities leads to many attacks on smart grid systems [5]. Softgoal and-refine refine legend Task Domain Assumptton Security operationalize Energy provider G6 Decide price T1 Calculate price G2 Have a proper price D1 Customer has an EMS G7 Have current load info T2 Collect load info G1 Real-time pricing G3 Send price info to customer T3 Send price info via AMI network G4 Customers response to current price T4 Adjust usage of customer device G5 Charge customers T5 Bill customers Billing T7 T6 Generate customer's bill High Confidentiality [customer data, G1] [energy consumption Low Availability [G3, G3] Low cost 3 Baseline Fig. 1: High-level requirements of real-time pricing scenario In this section, we introduce existing work, used as the baseline of our research. We first introduce the requirements problem, which specifies fundamental tasks that need to be addressed during requirements analysis. Then, we describe several requirements modeling language [10, 22, 6, 2], which are intended to capture requirements or tackle the requirements problem. Requirements Problem. Zave and Jackson [23] define a Requirements Engineering ontology to specify what is the requirements problem. This definition consists of three concepts: a Requirement is an optative property that specifies stakeholder s needs on the system-to-be; a Domain Assumption is an indicative property that is relevant to the system; a Specification is an optative property, which is able to be directly implemented by the system-to-be. Based on these three basic concepts, they define the requirements problem amounts to finding a set of specifications S, which can satisfy all system requirements R under domain assumptions K. Thus, the requirements problem is represented as K, S $ R.

4 Requirements Modeling Language. Jureta et al. [10] propose a goal-oriented requirements modeling language Techne, which includes all related concepts for addressing the requirements problem as defined by Zave and Jackson. In addition, it is able to model stakeholder s priority over different requirements, based on which, the best solution can be obtained amongst candidate solutions. Yu [22] proposes the i* framework for modeling organizational environments and system requirements. Specifically, it captures relationships among social actors via dependency relations. Chung adopts NFR to analyze security requirements [2]. In this work, a security requirement is represented as a security goal, which is specified in terms of sort and parameter. Giorgini et al. [6] model trusts relations between social actors in order to analyze social security issues. In this work, we base our three-layer framework on a combination of above approaches to model both functional and non-functional requirements (including security requirements), as well as social interactions. Particularly, we use the concepts actor, goal, softgoal, quality constraint, task, and domain assumption and the relations refine, preferredto, dependency, contribution, and trust, provided by those approaches. Fig. 3 shows how we combine these concepts and relations in our conceptual model. 4 Three- Security Analysis Framework Stakeholder s global security needs, which are captured as non-functional requirements, influence designs in all parts of the system. We propose to structure a system into three layers, and analyze security issues in each layer from a holistic viewpoint. 4.1 Three- Structure In this work, we have focused on three particular layers, which have received much attention from the security community. As shown in Fig. 2, at the most abstract layer, we consider the business layer, which highlights social dependencies, trusts, and business processes. At the next layer of abstraction, we consider software applications and their related IT infrastructures. Finally, we consider the physical infrastructure layer, which focuses on deployments of software applications and placements of devices. As an essential part of the three-layer structure, we propose to analyze the requirements problem for each layer respectively. Each layer has its own requirements R, which are operationalized into proper specifications S under corresponding domain assumptions K. As shown in the left part of Fig. 2, we apply goal-oriented modeling to each of the three layers with the aim of analyzing their requirements problems respectively. We base our three-layer security analysis approach on the proposed threelayer structure, which is shown in the right part of Fig. 2. Our approach starts with high-level stakeholder s security requirements; and then analyzes them throughout three layers with regard to layer-specific goal models; and finally generates a set of alternative global security treatments.

5 Stakeholder's high-level security needs Legend Business Model [S, K R] Model [S, K R] Physical Model [S, K R] Business layer security analysis Security-Enhanced Business Model layer security analysis Security-Enhanced Model Physical layer security analysis Extended Concept Business Physical Business Process Activity Function Deployment Imported Concept depend, trust Actor support operationalize Task Security Mechanism has preferredto, refine, and-refine Requirement Element Domain Assumption contribute Softgoal Security Quality Constraint operationalize Global Security Specification Fig. 2: Framework overview Fig. 3: Conceptual model of the Model within the three-layer framework 4.2 Three- Conceptual Models In this section, we specify conceptual models that we use for modeling and analyzing the three-layer architecture. Apart from concepts and relations we adopt from existing approaches, mentioned in Section 3, we further extend and make use of new concepts. Fig. 3 shows an overview of conceptual model of the three-layer framework, where the newly introduced concepts are highlighted in the dashed rectangles. Extended Requirement Concepts and Relations. As we build goal models for different layers capturing different concerns, we specialize into layerspecific goals that focus on a particular aspect. Business represents stakeholder s high-level requirements for his business. represents stakeholder s requirements regarding software applications that he uses to perform related business activities. Physical represents stakeholder s requirements on physical devices and facilities that support execution of software. Accordingly, we assign Task in different layers with operational definitions. In the business layer, a task is a Business Process Activity; in the application layer, an Function is deemed as a task; and in the physical layer, a task is specialized into a Deployment action. Apart from that, a number of relations are also proposed. Operationalize is a relation that presents how a goal/softgoal is operationalized into a task/quality constraint. This relation emphasizes the relationship between requirements and specifications, and indicates when a stakeholder s requirements are translated into operational specifications. For example, the business goal Have current load info shown in Fig. 1, which is desired by the Energy Provider, is operationalized into the task Collect load info in the same layer, which can accomplish this goal. Support is a cross-layer relation, which specifies a task designed in one layer is supported by requirements in the next layer down. Fig. 9 contains examples of this relation. Extended Security Requirement Concepts. Chung [2] leverages non-functional requirements analysis to deal with security requirements, which are represented

6 as security goals. Each security goal consists of one sort and one or more parameters. In our framework, we extend security goals to express more detailed security requirements, and introduce security mechanisms to represent security solutions. Security represents stakeholder s security needs with regard to asset and interval. We define a security goal as a specialization of softgoal, which particularly focuses on security issues. A security goal is specified in the format: <importance><security attribute>[<asset>, <interval>]. Take the security goal [energy consumption (in Fig. 1) as an example, its four dimensions together describe a security requirement protecting integrity of energy consumption data during the execution interval of G2 to a medium degree. Security Attribute specifies a characteristic of security. Particularly, we adopt security attributes use in [17, 4], which is shown in Fig. 5. The security attributes we consider in our work constitute a minimum set, which serves as a starting point and can be extended in the future. Asset is anything that has value to an organization, such as data, service. Fig. 4 shows an overview of all the types of assets that we have considered in our framework, as well as the interrelationships among them. Normally different assets are concerned in different layers. For example, we only consider Service and as assets in the business layer. Interval of a security goal indicates within which temporal interval the security goal is concerned. In this work, an interval is specified in terms of the execution period of a goal or task. Importance of a security goal indicates to which degree stakeholders want the security goal to be satisfied. We consider the value of importance within an enumeration {very low, low, medium, high, very high}. Business Physical Service execute deploy Hardware involve process store Fig. 4: Overview of assets Confidentiality Confidentiality Security Hardware Service Availability Availability Service Availability Hardware Availability Fig. 5: Hierarchy of security attributes Security Mechanism is a concrete mechanism provided by the system-to-be in order to achieve one or more security goals. We define the security mechanism as a specialization of task in goal model, which contributes to security goals and satisfies them. Thus, in our framework, security mechanisms are parts of specifications, and also influences requirements in its lower layers. 5 Security Analysis Methods In this section, we propose a systematic process and a set of security analysis methods to guide security analysis both within one layer and across layers.

7 Fig. 6 shows an overview of the analysis process, which starts from security analysis in the business layer and follows a top-down manner to propagate influences of security analysis in one layer to lower layers. Within one single layer, we refine and simplify security goals to identify concrete and critical ones, which are then operationalized into possible security mechanisms that are left to security analysts to select. After security analysis has been done for all layers, security treatments applied in each layer are synthesized to generate holistic security treatments. We propose security analysis methods and corresponding transformation rules to guide the aforementioned analysis steps, which have been implemented using log rules. We developed a prototype for a CASE tool, which automates some of the analysis steps as indicated in Fig. 6. Due to space limitation, we only describe and illustrate a small part of the transformation rules. A full list of the 23 transformation rules is available online 1. In the reminder of this section, we describe details the proposed security analysis methods in subsections, each of which support one or several analysis task shown in Fig. 6. Refinement Rules Cross- Rules Simplification Rules Operationaliz ation Rules legend Refine security goals (Sect.5.1) Refine security concerns in next layer Simplify security goals (Sect.5.2) Transfer security concerns across layers (Sect.5.4) No Analysis reaches bottom layer? Design security mechanisms (Sect.5.3) Yes Single- Security Analysis Select security mechanisms Obtain Holistic security solutions (Sect.5.5) User Task Computer-aided Task Exclusive Gateway Object Sequence Flow Association Flow Fig. 6: An overview of the three-layer security requirements analysis process 5.1 Refinement Methods A coarse-grained security goal is normally more difficult to analyze and operationalize than a fine-grained one, as it may be too abstract to be satisfied by specific security mechanisms. Thus, it is advisable for an analyst to refine a security goal till he obtains satisfiable ones. A security goal can be refined along any of its dimensions (security attributes, asset, or interval), i.e. there are three refinement methods. Fig. 7 shows an example of security goal refinements for security goal [energy consumption (Fig. 1). Note that a refinement process can be flexible in the sense that different refinement methods can be applied in any sequence and to any extent. Given the reference models that are shown in the left part of Fig. 7, the example presents only one possible way to refine the goal. Security attributes-based refinement: refining security goals via security attributes helps the security analysis to cover all possible aspects of security. According to the hierarchy of security attributes shown in Fig. 5, a security goal that talks about a high-level security attribute can be refined into 1

8 several sub-security goals that talks about corresponding low-level security attributes. For example, in Fig. 7, the security goal [energy consumption is refined into four sub-security goals. Asset-based refinement: refinement of security goals can also be done by refining assets via part-of relations, which propagates a security goal on an asset to all its components. The part-of relation is an abstract one, which can be specialized into particular types of part-of relation of different conceptual models, such as data schema, software architecture model etc. For example, the security goal [energy consumption (Fig. 7) is refined according to the part-of relations among energy consumption data, water consumption data, and electricity data. Interval-based refinement: because an interval specifies the temporal period, for which a security goal is concerned, the security analyst can put more detailed constraints on a particular time intervals by refining a long interval into smaller ones. Here, we use the execution periods of requirement goal/tasks to represent intervals of time. Thus the interval-based security goal refinements are carried out according to the refinement of system functionality in the requirements models. For example, the four leaf nodes (in Fig. 7) are refined according to the functional requirements model in Fig. 1. Reference Models G7 Have current load info T2 Collect load info [energy consumption Hardware G2 Have a proper price G6 Decide price T1 Calculate price Service Energy consumption data part-of Water consumption data part-of Electricity consumption data [energy consumption [water consumption data, T1] [water consumption [energy consumption [energy consumption [water consumption data, T2] Hardware [energy consumption [electricity consumption [electricity consumption data, T1] Service [energy consumption [electicity consumption data, T2] 5.2 Simplification Methods Fig. 7: Security goals refinements When dealing with a large number of security goals, analysts may not have enough time to go through each of them to determine which is critical and requires further treatments. Especially as the refinement methods, which are intended to cover every potential facet of security goals, easily result in many detailed security goals. To release analysts from scrutinizing all security goals, we introduce simplification methods, which identify critical security goals that need to be treated and exclude others. In order to determine the criticality of security goal, we consider two particular factors: applicability and risk level. The applicability specifies whether a security goal is sensible with regard to the content of the four dimensions

9 of a security goal. The risk level identifies to which extent the satisfaction of a security goal is threatened. The criticality of a security goal is determined by considering: 1) If a security goal is applicable and its risk level is either high or very high, then we treat this security goal as a critical one, which is highlighted with a character C. 2) All other security goals are deemed as non-critical and will be removed from following security analysis. It is worth noting that this criticality analysis can be adjusted depending on analyst time and the domain. For example, if analyst time allows, a security goal, which is at the medium risk level, could be adjusted as critical security goal. For the analysis of applicability, we consider not only related requirements and simple specifications, but also detailed specifications, i.e. design information. For instance, how business activities are arranged, how application components interact with others, and where physical devices are placed. Based on this information, we propose layer-specific inference rules to determine the applicability of a security goal in one layer. For example, the security goal [water consumption data, T1] (Fig. 7) is not suitable, because the asset water consumption data would not be changed during the execution of T1. Due to space limitation, in each layer we only present one rule as an example, which are shown in Table 1. Table 1: Rules for determining applicability of security goal Rule Rationale If a business process activity takes a data asset as input, the confidentiality of BUS.A.1 this asset might be impaired within this activity. Thus, corresponding security goals are identified as applicable. If an application component is called by another component for a data asset, the integrity and confidentiality of that data asset may be impaired during APP.S.1 functioning of that component. Thus, corresponding security goals are identified as applicable. If a hardware device stores a data asset, the integrity and confidentiality of INF.S.1 that data asset may be impaired during deployment task of that device. Thus, corresponding security goals are identified as applicable. For the risk level analysis, we carry out a trust-based approach, which consider the trust between the owner of a security goal and the actor that potentially impairs the security goal. For example, the maintainer of a smart meter may impair the integrity of that meter, if a customer owns a security goal that aims to protect the integrity of the smart meter, then our analysis considers to which extent the customer trusts the maintainer. Table 2 represents how we infer the risk level of security goals with regard to the trust level and the importance of security goals. Note that the letter L, M, H, V stands for low, medium, high, and very high level of risk respectively. 5.3 Operationalization Methods To bridge the gap between security requirements and security specifications within an individual layer, we propose operationalization methods which gen-

10 Table 2: Risk level evaluation matrix Importance Trust very low low medium high very high very bad H H V V V bad M H H V V neutral L M H H V good L L M H H very good L L L M H erate possible security mechanisms that could satisfy critical security goals. As security mechanism analysis and design requires additional security knowledge, which is normally not easy to obtain in reality, we exploit the power of security patterns to reuse security knowledge that tackles known security problems. Particularly, we survey existing work on security patterns [17, 8, 19], and extract the parts of them that are suitable for our security analysis framework. Note that the selection of security patterns is not intended to be exhaustive, and may evolve over time. A security pattern consists of a security attribute and a security mechanism that is supposed to satisfy that security attribute. Each security mechanism can contribute to one or several security attributes, and we use and links to represent their contributions. For example, one security pattern shown in Fig. 8 is Auditing has a contribution to Service. According to these security patterns, when operationalizing a critical security goal, we identify security mechanisms that contribute to the security attribute of the security goal. It is worth noting that security patterns, shown in the Fig. 8, may also have either positive or negative influences on other non-functional goals, such as Time, Cost, which are documented in the specification of the security patterns. 5.4 Cross- Analysis Methods After finishing single-layer security analysis in one layer, indicated in Fig. 6, we analyze its influences on lower-layers. In our framework, the influences are reflected in two ways, which require different analysis methods. Accordingly, a number of inference rules are proposed to automate the cross-layer transformations, parts of which are shown in Table 3. Firstly, each of the security mechanisms should be transformed into at least one goal in the lower-layer goal model. Because security mechanisms are critical for satisfying security goals, additional security goals are derived to ensure correct implementations of the corresponding functional goals. Fig. 9(a) shows an example of this transformation. The security mechanism Encryption is transformed into a function goal of smart meter application, because that application is supposed to execute the encryption activity. Apart from this functional goal, the transformation also introduces two security goals, which concerns application

11 Confidentiality Service Service Availability Business Cryptographic control Access Control Auditing Alternative service Server sand box Input Guard Firewall Availability Replicated System Load Balancer Confidentiality Limited View Full View with Errors Secure Pipe Encrypted Storage Secure Access Backup Physical Hardware Availability Hardware Confidentiality UPS Anti-tamper Protection Monitor Physical Entry Control Secure office Fig. 8: Applicable security patterns in three layers integrity and application availability of the smart meter application during the execution of encrypt data. Note that the importance of these two new security goals is, which is the same with the corresponding security goal in the business layer. Secondly, if a security goal has not been fully satisfied in one layer, this security goal will be refined into security goals in next layer down according to the newly available information in that layer. Fig. 9(b) shows an example of this transformation. The security goal [energy consumption data, Measure energy data] is not treated in the business layer. Considering the asset of this security goal is processed by the smart meter application in the application layer, the transformation rule BUStoAPP.2 is applied, which results in two sub-security goals. 5.5 Global Security Analysis After security analysis has been done in each layer, we can derive alternative global security treatments by synthesizing security analysis results of each layer. Each global security treatment may consist of security mechanisms from one or

12 Table 3: Rules for cross-layer security goal refinements Rule Rationale If a security goal concerns a service asset, which is supported by an BUStoAPP.1 application component, then the security goal introduces security goals that concern the integrity and availability of that application. If an untreated security goal that concerns data confidentiality or data integrity targeting at a business process activity, which is supported by BUStoAPP.2 an application in the application layer, then this security goal will be refined to sub-goals that concern corresponding applications. Legend Business Security goal Encryption Security Mechanism make help/make support [Energy consumption data, Send energy data] and-refine Measure energy data [energy consumption data, Measure energy data] SM Encrypt data [SM, Encrypt data] (a) Availability [SM, Encrypt ] SM Measure data [SM, Measure data] (b) [[energy consumption data, Measure ] Fig. 9: Examples of security transformation several layers. Take a snippet of the three-layer security analysis results of the smart grid as an example, which is shown in Fig. 10. In the business layer, the critical security goal can be either operationalized as Auditing or left to the next layer. In the first case, the Auditing security mechanism is transformed into a functional goal and two corresponding security goals. As the two security goals are identified as non-critical after refinement and simplification analysis, no further security treatments are required. Thus, we derive the first global security treatment. In the second case, the security goal is refined into two sub-security goals in the application layer, one of which is identified as critical. This critical security goal can be operationalized as either Firewall or Input Guard, each of which starts a new alternative. Apart from the operationalization, the security goal can also be left to next layer, which further introduces another two alternatives. Finally, we derive 5 global security treatments in this example. Among these alternatives, the Alt.3 contains a security mechanism from only one layer, i.e. Input Guard; while the Alt.2 contains two security mechanisms from two different layers, i.e. Firewall, Antitamper protection. 6 Related Work NFR-based Requirements Analysis. Chung proposes to treat security requirements as a class of NFRs, and apply a process-oriented approach to analyze security requirements [2]. In a subsequent work, Chung and Supakkul inte-

13 Business Alt.1 Auditing C [energy consumption data, Measure energy data] Legend C Critical Security Server Record measurement info Record function Audit measurement Check correctness Check function Availability [SM, Encrypt ] [SM, Encrypt data] Firewall Alt.2 [SM, Measure data] Input guard Alt.3 C [energy consumption data, Measure ] Physical Router Support firewall Integrate firewall component C Hardware [Router, Support firewall] Anti-tamper protection C Hardware Availability [Router, Support firewall] Alt.4 Physical entry control C Hardware [Router, Support firewall] Monitor Alt.5 Fig. 10: A snippet of three-layer security analysis result of the smart grid example grate NFRs with FRs in the UML use case model [3], which enable NFRs to be refined through functional requirement models. Another complementary work done by Gross and Yu propose to connect NFRs to designs via patterns [7]. However, all of these NFR-based approaches mainly focus on information system analysis, and lack of supporting requirements analysis in the business layer and the physical layer. Security Requirement Analysis. A large number of security requirement analysis approaches have been proposed over last two decades. Most of these approaches focus on analyzing security requirements with regard to a particular aspect of information system. There are approaches that focus on the social and organizational aspect. Mouratidis et al. [13] capture security intentions of stakeholders and interdependence among stakeholders; Giorgini et al. [6] investigate social relationships by integrating trust and ownership into security analysis; Liu et al. [11] analyze organizational risks by considering dependencies among social actors. Another branch of work deals with security requirements for business process. Rodríguez et al. [15] propose an extention of UML activity diagram to model security requirements within business process model, as well as a method that guides construction of the secure business process models. Herrmann et al. [9] propose a systematic process to elicit and analyze security requirements from business processes models. Most work is dedicated to analyzing security requirements of software, such as Attack Tree [18], Misuse case [20], and obstacle analysis [21]. All of these approaches are complementary to our approaches, as each of them could fit into one layer of our framework.

14 From Security Requirements to System Design. A number of approaches have been proposed to transform security requirements captured in the highabstraction level to the security design in the low-abstraction level in order to maintain security requirements throughout the whole life-cycle of system development. Mouratidis and Jürjen [14] translate security requirements into design by combining Security Tropos with UMLsec. Menzel et al. [12] propose an approach that transfers security requirements, which are captured at the business process layer, to security configuration for service-based systems by using patterns. Similarly, Rodríguez [16] et al. apply the MDA technique to transform secure business process model into analysis class diagram and use case diagram. The above approaches focus on maintaining security requirements identified in the early stage during later design stages. Different from their work, we propose to analyze security requirements in different layers from a holistic viewpoint and capture influences between security requirements in different layers. 7 Conclusions and Future Work In this paper, we propose a holistic approach to analyze security requirements for STSs. Our approach consists of a three-layer conceptual model, a systematic analysis process, a number of security analysis methods and transformation rules. Given high-level security requirements, this approach could continuously refine and propagate them into different layers of socio-technical systems. The approach focuses on capturing the influence of upper-layer designs on the requirements of lower layers, thus avoiding a piece-meal treatment of security. As we use goal modeling for security requirement analysis, we are bound to deal with complexity of such models. Compared to other goal-based approaches that model a system as a whole, ours structures STSs into three layers, each of which is modeled separately and connected via a clearly defined conceptual model. Thus, our approach contributes to reduce the scalability issues in individual model. In addition, we develop a prototype tool to facilitate our analysis, which supports graphic modeling and automates inferences over the transformation rules. However, our approach has limitations on its evaluation. So far, our approach is only applied to a single scenario of the Smart Grid case, which is an illustrative example rather than a practical evaluation. In the future, we plan to extend our framework by incorporating real security regulations and laws, such as ISO standards, in order to provide more practical and grounded security analysis. Moreover, the security patterns we leveraged during security goal operationalization should be updated in light of recent advances in the field [19] synchronized with the cutting edge of that field. Finally, with the help of the prototype, we intend to apply our approach to a practical case study that has a reasonable scale to evaluate and further improve our work. Acknowledgements This work was supported in part by ERC advanced grant , titled Lucretius: Foundations for Software Evolution.

15 References 1. Carpenter, M., Goodspeed, T., Singletary, B., Skoudis, E., Wright, J.: Advanced metering infrastructure attack methodology. InGuardians white paper (2009) 2. Chung, L.: Dealing with security requirements during the development of information systems. In: Rolland, C., Bodart, F., Cauvet, C. (eds.) Advanced Information Systems Engineering, LNCS, vol. 685, pp Springer Berlin Heidelberg (1993) 3. Chung, L., Supakkul, S.: Representing nfrs and frs: A goal-oriented and use case driven approach. In: Dosch, W., Lee, R., Wu, C. (eds.) Software Engineering Research and s, LNCS, vol. 3647, pp Springer Berlin Heidelberg (2006) 4. Firesmith, D.: Specifying reusable security requirements. Journal of Object Technology 3(1), (2004) 5. Flick, T., Morehouse, J.: Securing the smart grid: next generation power grid security. Elsevier (2010) 6. Giorgini, P., Massacci, F., Zannone, N.: Security and trust requirements engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) Foundations of Security Analysis and Design III, LNCS, vol. 3655, pp Springer Berlin Heidelberg (2005) 7. Gross, D., Yu, E.: From non-functional requirements to design through patterns. Requirements Engineering 6(1), (2001) 8. Hafiz, M., Adamczyk, P., Johnson, R.E.: Organizing security patterns. IEEE Software 24(4), (2007) 9. Herrmann, P., Herrmann, G.: Security requirement analysis of business processes. Electronic Commerce Research 6(3-4), (2006) 10. Jureta, I., Borgida, A., Ernst, N., Mylopoulos, J.: Techne: Towards a new generation of requirements modeling languages with goals, preferences, and inconsistency handling. In: Proc. of RE 10. pp (2010) 11. Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proc. of RE 03. vol. 3, pp Monterey, California (2003) 12. Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in serviceoriented business process management. In: Proceedings of International Conference on Availability, Reliability and Security, ARES 09. pp Ieee (2009) 13. Mouratidis, H., Giorgini, P.: A natural extension of tropos methodology for modelling security. In: Proc. of the Agent Oriented Methodologies Workshop (OOPSLA 2002). Citeseer, Seattle-USA, (2002) 14. Mouratidis, H., Jurjens, J.: From goal-driven security requirements engineering to secure design. International Journal of Intelligent System 25(8), (2010) 15. Rodríguez, A., Fernández-Medina, E., Trujillo, J., Piattini, M.: Secure business process model specification through a uml 2.0 activity diagram profile. Decision Support Systems 51(3), (2011) 16. Rodríŋguez, A., de Guzmán, I.G.R., Fernández-Medina, E., Piattini, M.: Semi-formal transformation of secure business processes into analysis class and use case models: An mda approach. Information and Software Technology 52(9), (2010) 17. Scandariato, R., Yskout, K., Heyman, T., Joosen, W.: Architecting software with security patterns. Tech. rep., KU Leuven (2008) 18. Schneier, B.: Attack trees. Dr. Dobb s journal 24(12), (1999) 19. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating security and systems engineering. John Wiley & Sons (2013) 20. Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10(1), (2005) 21. Van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Transactions on Software Engineering 26(10), (Oct 2000) 22. Yu, E.: Towards modelling and reasoning support for early-phase requirements engineering. pp IEEE Computer Soc. Press (1997) 23. Zave, P., Jackson, M.: Four dark corners of requirements engineering. ACM Trans. Softw. Eng. Methodol. 6(1), 1 30 (1997)

A Model Transformation from Misuse Cases to Secure Tropos

A Model Transformation from Misuse Cases to Secure Tropos A Model Transformation from Misuse Cases to Secure Tropos Naved Ahmed 1, Raimundas Matulevičius 1, and Haralambos Mouratidis 2 1 Institute of Computer Science, University of Tartu, Estonia {naved,rma}@ut.ee

More information

Tropos: Security. Agent-Oriented Software Engineering course Laurea Specialistica in Informatica A.A

Tropos: Security. Agent-Oriented Software Engineering course Laurea Specialistica in Informatica A.A Tropos: Security Paolo Giorgini Department of Information and Communication Technology University of Trento - Italy http://www.dit.unitn.it/~pgiorgio Agent-Oriented Software Engineering course Laurea Specialistica

More information

Perspectives on User Story Based Visual Transformations

Perspectives on User Story Based Visual Transformations Perspectives on User Story Based Visual Transformations Yves Wautelet 1, Samedi Heng 2, and Manuel Kolp 2 1 KU Leuven, Belgium yves.wautelet@kuleuven.be, 2 LouRIM, Université catholique de Louvain, Belgium

More information

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions Mohammad Jabed Morshed Chowdhury 1, 2, Raimundas Matulevičius 1, Guttorm Sindre 2, and Peter Karpati 2

More information

Chapter 6 Supporting ISO Compliant ISMS Establishment with Si*

Chapter 6 Supporting ISO Compliant ISMS Establishment with Si* Chapter 6 Supporting ISO 27001 Compliant ISMS Establishment with Si* Abstract The establishment of an ISO 27001 security standard demands a description of the environment including its stakeholders and

More information

Cyber Security and Privacy Issues in Smart Grids

Cyber Security and Privacy Issues in Smart Grids Cyber Security and Privacy Issues in Smart Grids Acknowledgement: Slides by Hongwei Li from Univ. of Waterloo References Main Reference Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. Cyber

More information

Guiding System Modelers in Multi View Environments: A Domain Engineering Approach

Guiding System Modelers in Multi View Environments: A Domain Engineering Approach Guiding System Modelers in Multi View Environments: A Domain Engineering Approach Arnon Sturm Department of Information Systems Engineering Ben-Gurion University of the Negev, Beer Sheva 84105, Israel

More information

Enterprise Models as Drivers for IT Security Management at Runtime

Enterprise Models as Drivers for IT Security Management at Runtime Enterprise Models as Drivers for IT Security Management at Runtime Anat Goldstein, Sietse Overbeek Institute for Computer Science and Business Information Systems, University of Duisburg-Essen, Germany

More information

Network Visibility and Segmentation

Network Visibility and Segmentation Network Visibility and Segmentation 2019 Cisco and/ or its affiliates. All rights reserved. Contents Network Segmentation A Services Approach 3 The Process of Segmentation 3 Segmentation Solution Components

More information

Modeling Issues Modeling Enterprises. Modeling

Modeling Issues Modeling Enterprises. Modeling Modeling Issues Modeling Enterprises SE502: Software Requirements Engineering Modeling Modeling can guide elicitation: It can help you figure out what questions to ask It can help to surface hidden requirements

More information

Using FDAF to bridge the gap between enterprise and software architectures for security

Using FDAF to bridge the gap between enterprise and software architectures for security Science of Computer Programming 66 (2007) 87 102 www.elsevier.com/locate/scico Using FDAF to bridge the gap between enterprise and software architectures for security Lirong Dai, Kendra Cooper Seattle

More information

Towards the integration of security patterns in UML Component-based Applications

Towards the integration of security patterns in UML Component-based Applications Towards the integration of security patterns in UML Component-based Applications Anas Motii 1, Brahim Hamid 2, Agnès Lanusse 1, Jean-Michel Bruel 2 1 CEA, LIST, Laboratory of Model Driven Engineering for

More information

Capturing Contextual Variability in i* Models

Capturing Contextual Variability in i* Models Capturing Contextual Variability in i* Models Alexei Lapouchnian 1 and John Mylopoulos 2 1 epartment of Computer Science, University of Toronto, Canada alexei@cs.toronto.edu 2 epartment of Information

More information

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements Capturing and Formalizing SAF Availability Management Framework Configuration Requirements A. Gherbi, P. Salehi, F. Khendek and A. Hamou-Lhadj Electrical and Computer Engineering, Concordia University,

More information

Pattern-Based Architectural Design Process Model

Pattern-Based Architectural Design Process Model Pattern-Based Architectural Design Process Model N. Lévy, F. Losavio Abstract: The identification of quality requirements is crucial to develop modern software systems, especially when their underlying

More information

Security Attack Analysis Using Attack Patterns

Security Attack Analysis Using Attack Patterns Security Attack Analysis Using Attack Patterns Tong Li, Elda Paja, John Mylopoulos University of Trento, Italy {tong.li, paja, jm}@disi.unitn.it Jennifer Horkoff City University London, UK horkoff@city.ac.uk

More information

CLOUD GOVERNANCE SPECIALIST Certification

CLOUD GOVERNANCE SPECIALIST Certification CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,

More information

Metamodeling for Business Model Design

Metamodeling for Business Model Design Metamodeling for Business Model Design Facilitating development and communication of Business Model Canvas (BMC) models with an OMG standards-based metamodel. Hilmar Hauksson 1 and Paul Johannesson 2 1

More information

Using QVT to obtain Use Cases from Secure Business Processes modeled with BPMN

Using QVT to obtain Use Cases from Secure Business Processes modeled with BPMN Using QVT to obtain Use Cases from Secure Business Processes modeled with BPMN Alfonso Rodríguez 1, Eduardo Fernández-Medina 2, and Mario Piattini 2 1 Departamento de Auditoría e Informática, Universidad

More information

Extension and integration of i* models with ontologies

Extension and integration of i* models with ontologies Extension and integration of i* models with ontologies Blanca Vazquez 1,2, Hugo Estrada 1, Alicia Martinez 2, Mirko Morandini 3, and Anna Perini 3 1 Fund Information and Documentation for the industry

More information

A Collaborative User-centered Approach to Fine-tune Geospatial

A Collaborative User-centered Approach to Fine-tune Geospatial A Collaborative User-centered Approach to Fine-tune Geospatial Database Design Grira Joel Bédard Yvan Sboui Tarek 16 octobre 2012 6th International Workshop on Semantic and Conceptual Issues in GIS - SeCoGIS

More information

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist CLOUD SECURITY SPECIALIST Certification Cloud Security The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms,

More information

Supporting the Context Establishment according to ISO using Patterns

Supporting the Context Establishment according to ISO using Patterns Supporting the Context Establishment according to ISO 27005 using Patterns Kristian Beckers, Stephan Faßbender paluno - The Ruhr Institute for Software Technology - University of Duisburg-Essen, Germany

More information

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology

More information

Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases

Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases Bridging User-Centered Design and Requirements Engineering with GRL and Persona Cases Shamal Faily Department of Computer Science, University of Oxford Wolfson Building, Parks Road, Oxford OX1 3QD UK shamal.faily@cs.ox.ac.uk

More information

A Firewall Architecture to Enhance Performance of Enterprise Network

A Firewall Architecture to Enhance Performance of Enterprise Network A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Secure system development is not a trivial task. It comprises a number of activities, which need to be combined, analysed, and executed to produce a secure software system. In this

More information

Towards Ontology-driven Requirements Engineering (ODRE)

Towards Ontology-driven Requirements Engineering (ODRE) Towards Ontology-driven Requirements Engineering (ODRE) Katja Siegemund 1, Edward J. Thomas 2, Uwe Aßmann 1, Jeff Pan 2, Yuting Zhao 2 1 Technische Universität Dresden, Germany 2 University of Aberdeen,

More information

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures

Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Scenarios, Quality Attributes, and Patterns: Capturing and Using their Synergistic Relationships for Product Line Architectures Muhammad Ali Babar National ICT Australia Ltd. and University of New South

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

Countering the Insider Threat: Behavioral Analytics Security Intelligence Cell (BASIC)

Countering the Insider Threat: Behavioral Analytics Security Intelligence Cell (BASIC) Countering the Insider Threat: Behavioral Analytics Security Intelligence Cell (BASIC) Jesse Hughes CSG LLP Tammy Torbert Solution Architect, HP ESP In the next 35 minutes we ll cover the following: The

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Introduction Software Life-Cycle Management Architecture Handbook View Model Architecture View Models If this is real world s physical complexity..

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

Transforming Transaction Models into ArchiMate

Transforming Transaction Models into ArchiMate Transforming Transaction Models into ArchiMate Sybren de Kinderen 1, Khaled Gaaloul 1, and H.A. (Erik) Proper 1,2 1 CRP Henri Tudor L-1855 Luxembourg-Kirchberg, Luxembourg sybren.dekinderen, khaled.gaaloul,

More information

An Ontology-Based Methodology for Integrating i* Variants

An Ontology-Based Methodology for Integrating i* Variants An Ontology-Based Methodology for Integrating i* Variants Karen Najera 1,2, Alicia Martinez 2, Anna Perini 3, and Hugo Estrada 1,2 1 Fund of Information and Documentation for the Industry, Mexico D.F,

More information

Report. ISMS-CORAS: A Structured Method for Establishing an ISO Compliant Information Security Management System

Report. ISMS-CORAS: A Structured Method for Establishing an ISO Compliant Information Security Management System SINTEF A25626- Unrestricted Report ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System Authors Kristian Beckers Maritta Heisel Bjørnar Solhaug

More information

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist A Survival Guide to Continuity of Operations David B. Little Senior Principal Product Specialist Customer Perspective: Recovery Time & Objective Asynchronous Replication Synchronous Replication WAN Clustering

More information

Enterprise Architecture Frameworks

Enterprise Architecture Frameworks Enterprise Architecture Frameworks Learning Objective of Chapter 2 Topic: Enterprise Architecture Framework Content and structure of enterprise architecture descriptions This is necessary because Enterprises

More information

A System of Patterns for Web Navigation

A System of Patterns for Web Navigation A System of Patterns for Web Navigation Mohammed Abul Khayes Akanda and Daniel M. German Department of Computer Science, University of Victoria, Canada maka@alumni.uvic.ca, dmgerman@uvic.ca Abstract. In

More information

Well Lifecycle: Workflow Automation

Well Lifecycle: Workflow Automation 2017 Well Lifecycle: Workflow Automation STEVE COOPER, PRESIDENT This document is the property of EnergyIQ and may not be distributed either in part or in whole without the prior written consent of EnergyIQ.

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Diseño y Evaluación de Arquitecturas de Software. Architecture Based Design Method

Diseño y Evaluación de Arquitecturas de Software. Architecture Based Design Method Diseño y Evaluación de Arquitecturas de Software Architecture Based Design Method César Julio Bustacara Medina Facultad de Ingeniería Pontificia Universidad Javeriana 08/10/2015 1 Architecture Based Design

More information

University of East London Institutional Repository:

University of East London Institutional Repository: University of East London Institutional Repository: http://roar.uel.ac.uk This conference paper is made available online in accordance with publisher policies. Please scroll down to view the document itself.

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Service Definition Table of Contents 1 INTRODUCTION... 2 2 SERVICE OFFERINGS VULNERABILITY MANAGEMENT... 2 3 SOLUTION PURPOSE... 3 4 HOW IT WORKS... 3 5 WHAT S INCLUDED... 4 6

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

ArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology

ArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology ArchiMate Core Structural Concepts Behavioral Concepts Informational Concepts interaction Technology Application Layer Concept Description Notation Concept Description Notation Actor An organizational

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

What is Software Architecture

What is Software Architecture What is Software Architecture Is this diagram an architecture? (ATM Software) Control Card Interface Cash Dispenser Keyboard Interface What are ambiguities in the previous diagram? Nature of the elements

More information

A Brief Comparison of Security Patterns for Peer to Peer Systems

A Brief Comparison of Security Patterns for Peer to Peer Systems A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Dong Han and Kilian Stoffel Information Management Institute, University of Neuchâtel Pierre-à-Mazel 7, CH-2000 Neuchâtel,

More information

A Tool to Edit and Verify IoT System Architecture Model

A Tool to Edit and Verify IoT System Architecture Model A Tool to Edit and Verify IoT System Architecture Model Shinpei Ogata, Hiroyuki Nakagawa, Yoshitaka Aoki, Kazuki Kobayashi, Yuko Fukushima Shinshu University, Nagano, Japan Email: ogata@cs.shinshu-u.ac.jp,

More information

2 The BEinGRID Project

2 The BEinGRID Project 2 The BEinGRID Project Theo Dimitrakos 2.1 Introduction Most of the results presented in this book were created within the BEinGRID project. BEinGRID, Business Experiments in GRID, is the European Commission

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems

A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems Sojan Markose, Xiaoqing

More information

INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2

INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 1 Faculty of Sciences, Lebanese University 2 LINA Laboratory, University of Nantes ABSTRACT:

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Unified Process for Domain Analysis integrating Quality, Aspects and Goals

Unified Process for Domain Analysis integrating Quality, Aspects and Goals Unified Process for Domain Analysis integrating Quality, Aspects and Goals Francisca Losavio Laboratorio MoST, Centro ISYS, Escuela de Computación, Facultad de Ciencias, Universidad Central de Venezuela

More information

3. Agent-Oriented Methodologies Part 2: The PROMETHEUS methodology.

3. Agent-Oriented Methodologies Part 2: The PROMETHEUS methodology. Multiagent Syste ems Design (MASD D) Part 2: The PROMETHEUS methodology. https://kemlg.upc.edu Javier Vázquez-Salceda MASD Methodological Extensions to Object-Oriented Approaches A means for agent technologies

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

A UML Profile for Risk-Driven Development

A UML Profile for Risk-Driven Development A UML Profile for Risk-Driven Development CS Technical Report 06-101 Geri Georg Department of Computer Science Colorado State University Fort Collins, CO 80523-1873 georg@cs.colostate.edu Siv Hilde Houmb

More information

Efficient Design of SCADA Systems Using Minimum Spanning Trees and the NFR Framework

Efficient Design of SCADA Systems Using Minimum Spanning Trees and the NFR Framework Efficient Design of SCADA Systems Using Minimum Spanning Trees and the NFR Framework Haranath Yakkali Nary Subramanian Dept. of Computer Science Dept. of Computer Science University of Texas at Tyler University

More information

LBI Public Information. Please consider the impact to the environment before printing this.

LBI Public Information. Please consider the impact to the environment before printing this. LBI Public Information. Please consider the impact to the environment before printing this. DGPC Framework People Executive management commitment Engaged management team Integrated governance organization

More information

Holistic view on security as foundation for trust and innovation in new energy markets

Holistic view on security as foundation for trust and innovation in new energy markets Smart Energy Demand Coalition Holistic view on security as foundation for trust and innovation in new energy markets CEER workshop on Meter Data Management Brussels, 19 April 2012 Thomas Weisshaupt UPLOAD

More information

Architectural Blueprint

Architectural Blueprint IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint

More information

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E- BANKING IN SUDAN Inshirah M. O. Elmaghrabi*, Hoida A. Abdelgadir,

More information

An Agent Modeling Language Implementing Protocols through Capabilities

An Agent Modeling Language Implementing Protocols through Capabilities An Agent Modeling Language Implementing Protocols through Capabilities Nikolaos Spanoudakis 1,2 1 Technical University of Crete, Greece nikos@science.tuc.gr Pavlos Moraitis 2 2 Paris Descartes University,

More information

Security Engineering for Software

Security Engineering for Software Security Engineering for Software CS996 CISM Jia An Chen 03/31/04 Current State of Software Security Fundamental lack of planning for security Most security issues come to light only after completion of

More information

20331B: Core Solutions of Microsoft SharePoint Server 2013

20331B: Core Solutions of Microsoft SharePoint Server 2013 20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun Reading This lecture [McGraw]: Ch. 7-9 2 Seven Touchpoints 1. Code review 2. Architectural

More information

Firewall Policy Modelling and Anomaly Detection

Firewall Policy Modelling and Anomaly Detection Firewall Policy Modelling and Anomaly Detection 1 Suhail Ahmed 1 Computer Science & Engineering Department, VTU University, SDIT, Mangalore, Karnataka. India Abstract - In this paper an anomaly management

More information

IEC A cybersecurity standard approaching the Rail IoT

IEC A cybersecurity standard approaching the Rail IoT IEC 62443 A cybersecurity standard approaching the Rail IoT siemens.com/communications-for-transportation Today s Siemens company structure focusing on several businesses Siemens AG Power and Gas (PG)

More information

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints Reading This lecture [McGraw]: Ch. 7-9 CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun 2 Seven Touchpoints Application of Touchpoints

More information

An Extension of Business Process Model and Notation for Security Risk Management

An Extension of Business Process Model and Notation for Security Risk Management An Extension of Business Process Model and Notation for Security Risk Management Olga Altuhhova, Raimundas Matulevičius and Naved Ahmed Institute of Computer Science, University of Tartu J. Liivi 2, 50409

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

Microsoft Core Solutions of Microsoft SharePoint Server 2013

Microsoft Core Solutions of Microsoft SharePoint Server 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the

More information

Security Risk Management Domain Model

Security Risk Management Domain Model Lecture 2: Security Modelling Understanding security goals and secure business activities Dr. Raimundas Matulevičius email: rma@ut.ee 1" Security Risk Management Domain Model "2"" Goals and Questions What

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method

for TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Enhancement of User Experience by Task Analysis:A Proposal

Enhancement of User Experience by Task Analysis:A Proposal Enhancement of User Experience by Task Analysis:A Proposal Khadija Fyiaz msit09153033@student.uol.edu.pk Aliza Basharat mscs09161007@student.uol.edu.pk Javed Anjum Sheikh Javed.anjum@cs.uol.edu.pk Anam

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

A Practical Approach to Implement a Risk Based ISMS

A Practical Approach to Implement a Risk Based ISMS A Practical Approach to Implement a Risk Based ISMS Pascal Reiniger Chief Information Security Officer Kanton Basel-Stadt Zürich Security Interest Group Switzerland 07.11.2017 Agenda 1. Introduction 2.

More information

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings

More information

Requirements Analysis Method For Extracting-Transformation-Loading (Etl) In Data Warehouse Systems

Requirements Analysis Method For Extracting-Transformation-Loading (Etl) In Data Warehouse Systems Requirements Analysis Method For Extracting-Transformation-Loading (Etl) In Data Warehouse Systems Azman Taa, Mohd Syazwan Abdullah, Norita Md. Norwawi College of Arts and Sciences Universiti Utara Malaysia,

More information

Computation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):

Computation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM): viii Preface The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Using Component-oriented Process Models for Multi-Metamodel Applications

Using Component-oriented Process Models for Multi-Metamodel Applications Using Component-oriented Process Models for Multi-Metamodel Applications Fahad R. Golra Université Européenne de Bretagne Institut Télécom / Télécom Bretagne Brest, France Email: fahad.golra@telecom-bretagne.eu

More information

ICT-SHOK Project Proposal: PROFI

ICT-SHOK Project Proposal: PROFI ICT-SHOK Project Proposal: PROFI Full Title: Proactive Future Internet: Smart Semantic Middleware Overlay Architecture for Declarative Networking ICT-SHOK Programme: Future Internet Project duration: 2+2

More information

A Brief Profile 2017

A Brief Profile 2017 A Brief Profile 2017 Future Netwings Solutions India s leading ISO 9001:2008 Certified IT Services Organization Over 18 Years experience in IT Infrastructure Design, Build & Support Sales & Support locations

More information

mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management

mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management mhealth: Privacy Challenges in Smartphone-based Personal Health Records and a Conceptual Model for Privacy Management ehealth Workshop 28-29 Oct 2014 Middlesex University, London, UK Edeh Esther Omegero

More information